Abstract is missing.
- Do Identity and Location Data Interrelate? New Affiliations and Privacy Concerns in Social-Driven SharingKaterina Vgena, Angeliki Kitsiou, Christos Kalloniatis, Dimitris Kavroudakis. 3-16 [doi]
- I Agree: Customize Your Personal Data Processing with the CoRe User InterfaceOlha Drozd, Sabrina Kirrane. 17-32 [doi]
- I Did Not Accept That: Demonstrating Consent in Online Collection of Personal DataVitor Jesus, Shweta Mustare. 33-45 [doi]
- Privacy Policy Specification Framework for Addressing End-Users' Privacy RequirementsNazila Gol Mohammadi, Jens Leicht, Nelufar Ulfat-Bunyadi, Maritta Heisel. 46-62 [doi]
- A Data Utility-Driven Benchmark for De-identification MethodsOleksandr Tomashchuk, Dimitri Van Landuyt, Daniel Pletea, Kim Wuyts, Wouter Joosen. 63-77 [doi]
- DEFeND Architecture: A Privacy by Design Platform for GDPR ComplianceLuca Piras, Mohammed Ghazi Al-Obeidallah, Andrea Praitano, Aggeliki Tsohou, Haralambos Mouratidis, Beatriz Gallego-Nicasio Crespo, Jean Baptiste Bernard, Marco Fiorani, Emmanouil Magkos, Andrès Castillo Sanz, Michalis Pavlidis, Roberto D'Addario, Giuseppe Giovanni Zorzino. 78-93 [doi]
- General Data Protection Regulation and ISO/IEC 27001: 2013: Synergies of Activities Towards Organisations' ComplianceVasiliki Diamantopoulou, Aggeliki Tsohou, Maria Karyda. 94-109 [doi]
- The Interrelation of Game Elements and Privacy Requirements for the Design of a System: A MetamodelAikaterini-Georgia Mavroeidi, Angeliki Kitsiou, Christos Kalloniatis. 110-125 [doi]
- Decentralised and Collaborative Auditing of WorkflowsAntonio Nehme, Vitor Jesus, Khaled Mahbub, Ali E. Abdallah. 129-144 [doi]
- Gender Inference for Facebook Picture OwnersBizhan Alipour, Abdessamad Imine, Michaël Rusinowitch. 145-160 [doi]
- Unifying Cyber Threat IntelligenceFlorian Menges, Christine Sperl, Günther Pernul. 161-175 [doi]